I delivered three projects where the business does not have any encryption mechanism in place if the company or an employee lost any of the device, there are chances someone could view sensitive data. After the Microsoft BitLocker... more»

* The software offers a three-click policy setup * There is no key management servers to install * The compliance and reporting features are simple * The option for self-service key recovery for the user or administrator is simplistic.

As part of security consulting, different projects and clients require different levels of security. For the last few years, I used Sophos high security routers. I have come to find the full disk encryption and enterprise management options... more»

I do not see very many downfalls, but I would recommend adding a few different encryption algorithms. For example, adding Triple DES, Blowfish, and Twofish, would only provide added value to the users. They could then decide how to secure the... more»